The cybercriminal's guide to easy and profitable crimes

February 26, 2025 | Cybersecurity
Iain Shaw

Written by
Iain Shaw

Alright, let’s be real. If you’re in the cybercrime game, you’re looking for that sweet spot - low effort, high reward, and minimal risk. Law enforcement is getting sharper, but there are still plenty of gaps to exploit. So, what are the best hustle routes that give you the biggest bang for your buck? Let’s break it down.

Phishing – the classic that never dies

Why? Because people are gullible. No matter how much cybersecurity is being used, employees will always click on links they shouldn’t. The trick? Craft a convincing email -maybe a fake invoice, a password reset request, or a juicy ‘You’ve Won!’ message.

  • Effort: Low
  • Risk: Moderate (as long as you use proxies and burner emails)
  • Profitability: High (if targeting businesses and executives)

Ransomware – the ultimate paycheck

If you want the big leagues, ransomware is the way to go. Find an unpatched system, encrypt everything, and demand payment in Bitcoin. Businesses, hospitals, even city governments will pay up rather than lose their data.

  • Effort: Moderate (requires some coding or access to existing ransomware-as-a-service tools)
  • Risk: High (law enforcement are watching closely. Also, watch out if you are using ransomware-as-a-service as some of the teams that run these things have ‘morals’ and will take a dim view of you jamming up a hospital for example)
  • Profitability: Extreme (payouts in the millions are common)

Selling stolen data – digital goldmine

Data is currency. From credit card numbers to personal identity information, there’s always a market on the dark web. You don’t even need to steal it yourself - just buy dumps from other hackers and resell at a markup.

  • Effort: Low (if you know where to buy)
  • Risk: Low to moderate (depends on how well you cover your tracks)
  • Profitability: Steady stream of income

Business email compromise (BEC) – the corporate con

This one is all about social engineering. Impersonate an executive, send an urgent wire transfer request to the finance team, and watch the money roll in. Companies lose billions to this scam every year.

  • Effort: Moderate (requires research and email spoofing skills)
  • Risk: Medium (depends on your OPSEC and geographic location)
  • Profitability: Very high (individual payouts can be in the millions)

Cryptojacking – the silent hustle

Why go after individuals when you can quietly use their resources? Infect computers with malware that mines cryptocurrency in the background, and let their hardware do the work for you.

  • Effort: Moderate (you need to spread the malware)
  • Risk: Low (victims rarely notice until their computers slow down to a near halt)
  • Profitability: Passive income, baby!

Fake online stores – the quick cash grab

Set up a website selling high-demand items at irresistible prices. Take payments, never ship the goods, and disappear before charge-backs hit.

  • Effort: Low (templates make it easy)
  • Risk: Moderate (use fake identities and change domains frequently)
  • Profitability: High (as long as you keep moving)

ATM skimming – the real-world touch

Old school, but still effective. Install a skimmer on an ATM, capture card details, and clone them for withdrawals. High risk but big rewards if done right.

  • Effort: High (requires hardware setup and physical presence)
  • Risk: High (security cameras and bank fraud units are on it)
  • Profitability: High (especially in high-traffic areas)

Final thoughts: play smart, stay hidden

The key to cybercrime isn’t just technical skills, it’s knowing how to stay invisible. Use encrypted communications, never trust anyone completely, and always be ready to pivot. The money is out there; you just need to know where to look.

[Disclaimer: This article is intended as ironic. Please don't actually commit crimes, or you'll end up with more than just computer problems!]

For any information on the solutions and support we provide partners to protect their clients from the latest threats, speak to our team.

Recommended reading

February 2025, cybersecurity round-up

February has been another busy month, as cyber threats target everything from critical infrastructure to ...

Strengthening Identity Access Management with Uniqkey

MSPs face an ongoing challenge in securing diverse digital environments while ensuring seamless access ...

How AuthN by IDEE is revolutionising MFA

Organisations need secure yet user-friendly solutions to protect digital assets. For MSPs, this means ...